V4i5 0447
V4i5 0447
Abstract – This paper introduces a detailed analysis of between big data and cloud computing security issues and
challenges focusing on the cloud computing types and the service delivery types. Big data is a data analysis methodology
enabled by recent advances in technologies and architecture. However, big data entails a huge commitment of hardware
and processing resources, making adoption costs of big data technology prohibitive to small and medium sized businesses.
Cloud computing is a set of it services that are provided to a customer over a network on a leased basis and with the ability
to scale up or down their service requirements. It advantages includes scalability, resilience, flexibility, efficiency and
outsourcing non-core activities. It offers an innovative business model for organizations to adopt it services without
upfront investment irrespective of the potential gains achieved from the cloud computing, the organizations are slow in
accepting it due to the security issues and associated challenges security is one of the major issues which hamper the
growth of cloud. The use of big data could provide sufficient benefit to a small to medium sized company to the extent that
the business would be willing to commit resources to implement big data technology in-house. However, the level of
benefit is difficult to determine without some experience.
I. INTRODUCTION
The concept of cloud computing originated in early 1960s, when John McCarthy an American computer scientist predicted
the eventual convergence of computing infrastructure, which would allow a great degree of versatility in the distribution of IT
resources in order to meet fluctuating and unpredictable business demands. It is an extremely successful paradigm of service
oriented computing which has revolutionized the way computing infrastructure is abstracted and used.
The popularity and versatility of the internet enabled companies like Amazon to modernized their data centers and adopt the
cloud architecture which allowed them to outsource computing power to external customers. This service was later launched
in 2006, after which numerous companies took the initiative to create cloud-based infrastructure.
Cloud Computingis a term used to describe a new class of network based computing that takes place over the Internet or a
model that relies on a large, centralized data center to store and process a great wealth of information[1].
It can be defined as a collection of integrated and networked hardware, software and Internet infrastructure called a platform
i.e. using the Internet for communication and transporting hardware, software and networking services to clients. This
platform hides the complexity and details of the underlying infrastructure from users and applications by providing very
simple graphical interface or API (Applications Programming Interface) and also provides on-demand services that are
always on, anywhere, anytime and anyplace.
It is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management
effort or service provider intervention. Computing power and storage space is provided on-demand to companies that
outsource their IT management to the cloud service provider.
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure,
training new personnel, or licensing new software. But as more and more information are placed in the cloud, concerns begin
to grow about the security of the cloud environment. Security issues in cloud computing has played a major role in slowing
down its acceptance. This work is a survey more specific to the different security issues and the associated challenges that has
emanated in the cloud computing system.
Software/
Application
Platform
Infrastructure
i. Public cloud:-
A public cloud is the pay- as-you-go services available to the general public. In this configuration, a business does not own
the core technology resources and services but outsource these to service providers. Public cloud is also considered to be an
external cloud. Public cloud describes cloud computing in the traditional mainstream sense, whereby resources are
dynamically provisioned on a fine-grained, self-service basis over the Internet, via web applications/web services, from an
off-site third-party provider who shares resources and bills on a fine-grained utility computing basis. It is typically based on a
pay-per-use model, similar to a prepaid electricity metering system, whose flexibility caters for spikes in demand for cloud
optimization. Public clouds are less secure than the other cloud models because it places an additional burden of ensuring all
applications and data accessed on the public cloud are not subjected to malicious attacks.
i. Security: -
Security issue plays the most important role in hindering Cloud computing acceptance. Security issues such as data loss,
phishing, botnet poses serious threats to organization's data and software. For example, hackers can use Cloud to organize
botnet as Cloud often provides more reliable infrastructure services at a relatively cheaper price for them to start an attack.
VII. CONCLUSION
Despite the benefits enumerated, it is surprising that not many companies and organizations are rushing to leverage the
advantages of Cloud computing, especially in developing countries because the benefits of cloud computing are tempered by
two major concerns – security and loss of control. Although Big data and Cloud computing is a new phenomenon which is
set to revolutionize caution must be exercised in the way we use the Internet. There are many new technologies emerging at a
rapid rate, each with improvements in making living much easier for users. However, there is a need for a cost-performance
trade off while deliberating on what type of cloud service to adopt. If the data being processed is considered mission critical
to the company, the more expensive private cloud, implemented in-house, would provide a more secured environment with
the company keeping the mission critical data in-house.
The use of big data could provide sufficient benefit to a small to medium sized company to the extent that the business would
be willing to commit resources to implement big data technology in-house. However, the level of benefit is difficult to
© 2014, IJARCSSE All Rights Reserved Page | 1196
Ivanda, International Journal of Advanced Research in Computer Science and Software Engineering 4(6),
June - 2014, pp. 1192-1197
determine without some experience. Cloud computing implementation of big data has the potential to become a frontrunner
in promoting a secure, virtual and economically viable IT solution in the future.
Cloud computing may proof to be a better option for most businesses down the line. Indicators show that more people are
beginning to understand what it entails, how it works and its usefulness. But still, the fear of surrendering absolute control of
core business operations and processes to the Cloud still remains a nagging issue that will only go away in the future.
Although it will be extremely difficult to provide a complete solution to securing the Cloud in relative terms thereby
completely erasing the anxiety and disquiet which the idea of outsourcing key and crucial business operations, and
technology may create. Security measures such as data encryption is advised and should be employed by end-users to reduce
the fear and risk of data invasion. If the fear of Cloud computing are addressed, Cloud computing will revolutionize the world
of information technology, even in developing countries Cloud computing promises real benefits to companies seeking a
competitive edge in today’s economy.
REFERENCES
[1] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G…Zaharia, M. (2010, April). A
view of cloud computing. Communications of the ACM, 53(4), 50-58. DOI: 10.1145/1721654.1721672.
[2] Rouse, M. (2010b, August). Infrastructure as a Service. Retrieved from
http://searchcloudcomputing.techtarget.com/definition /Infrastructure-as-a -Service-IaaS
[3] Cisco. (2009). Infrastructure as a Service: Accelerating time to profitable new revenue streams. Retrieved from
http://www.cisco.com/en/US/solutions/collateral/ns341/ns991/ns995 /IaaS_BDM_WP.pdf
[4] Salesforce.com. (2012). The end of software: Building and running applications in the cloud. Retrieved from
http://www.salesforce.com/paas/
[5] Géczy, P., Izumi, N., &Hasida, K. (2012). Cloudsourcing: Managing cloud adoption. Global Journal of Business
Research, 6(2), 57-70.
[6] Oracle. (2012). Oracle platform as a service. Retrieved from http://www.oracle.com/ us/technologies/cloud/oracle-
platform-as-a-service-408171.html
[7] Jackson, K. L. (2012). Platform-as-a-service: The game changer. Retrieved from
http://www.forbes.com/sites/kevinjackson/2012/01/25/platform-as-a-service-the-gamechanger/
[8] Cole, B. (2012). Looking at business size, budget when choosing between SaaS and hosted ERP. E-guide:
Evaluating SaaS vs. on premise for ERP systems. Retrieved from
http://docs.media.bitpipe.com/io_10x/io_104515/item_548729/SAP_sManERP_IO%23104515_EGuide_061212.pdf
[9] Carraro, G., & Chong, F. (2006, October). Software as a service: An enterprise perspective. Retrieved from
http://msdn.microsoft.com/en-us/library/aa905332.aspx #enterprisertw_topic3
[10] Rouse, M. (2010a, August). Software as a service. Retrieved from http://searchcloudcomputing
.techtarget.com/definition/Software-as-a-Service
[11] ComputureWeekly.com. (2009, March). Hardware as a service. Retrieved from
http://www.computerweekly.com/feature/Hardware-as-a-Service
[12] Rouse, M. (2007, December). Hardware as a service. Retrieved from http://searchitchannel
.techtarget.com/definition/Hardware-as-a-Service-in-managed-services
[13] Panettieri, J. (2011, June 13). Can Google take hardware as a service (HaaS) mainstream? MSPMentor. Retrieved
from http://www.mspmentor.net/2011/06/13/can-google-takehardware- as-a-service-haas-mainstream/
[14] White, C. (2011). Data Communications and Computer Networks: A business user’s approach, (6th ed.). Boston:
Cengage Learning.
[15] IOS Press. (2011). Guidelines on security and privacy in public cloud computing. Journal of EGovernance, 34 149-
151. DOI: 10.3233/GOV-2011-0271